CCNA 2 Chapter 10 Device Discovery, Management, and Maintenance
This level indicates that the messages are output generated from issuing various debug commands.
Debugging Level 7
Some common syslog message facilities reported on Cisco IOS routers include:
IP OSPF protocol SYS operating system IP security (IPsec) Interface IP (IF)
This protocol advertises its identity and capabilities to other devices and receives the information from a physically connected Layer 2 device.
Link Layer Discovery Protocol (LLDP)
With console access, a user can access the ______ mode by using a break sequence during the boot up process or removing the external flash memory when the device is powered off.
ROMMON
all the password recovery procedures follow the same principle:
Step 1. Enter the ROMMON mode. Step 2. Change the configuration register to 0x2142 to ignore the startup config file. Step 3. Make necessary changes to the original startup config file. Step 4. Save the new configuration.
to activate an Evaluation RTU license:
Router# license boot module <module-name> technology-package <package-name>
Clear the technology package license from license storage.
Router# license clear <feature-name>
to configure a one-time acceptance of the EULA:
Router(config)# license accept end user agreement
Disable the active license with the command:
Router(config)# license boot module <module-name> technology-package <package-name> disable
Clear the license boot module command used for disabling the active license:
Router(config)# no license boot module <module-name> technology-package <package-name> disable
Follow these steps to backup the running configuration to a TFTP server:
Step 1. Enter the copy running-config tftp command. Step 2. Enter the IP address of the host where the configuration file will be stored. Step 3. Enter the name to assign to the configuration file. Step 4. Press Enter to confirm each choice.
To restore the running configuration or the startup configuration from a TFTP server, use either the __________or___________ command
copy tftp running-config or copy tftp startup-config
Assuming the file name is R1-Config, use the command _______ to restore a running configuration.
copy usbflash0:/R1-Config <running-config>
For Cisco devices, CDP is ______by default. For security reasons, it may be desirable to disable CDP on a network device globally, or per interface. With CDP, an attacker can gather valuable insight about the network layout, such as IP addresses, IOS versions, and types of devices.
enabled
syslog messages also contain information on the ____. Syslog _______ are service identifiers that identify and categorize system state data for error and event message reporting. The logging facility options that are available are specific to the networking device.
facilit(y)(ies)
The syslog logging service provides three primary functions:
gather logging info select type of logging info captured specify destinations of captured messages
NTP networks use a _______system of time sources. Each level in this hierarchical system is called a stratum.
hierarchical
Using a network TFTP server allows image and configuration uploads and downloads over the ______. The network TFTP server can be another router, a workstation, or a host system.
network.
To disable CDP on a specific interface, such as the interface facing an ISP, enter______ in the interface configuration mode. no more CDP advertisements will be sent out that interface
no cdp enable
CDP can be disabled for all the interfaces on the device with the _____ command in the global configuration mode.
no cdp run
CDP disabled globally using the command ________ and re-enabled using the_________ command.
no cdp run , cdp run
To disable LLDP, enter the_____command in the global configuration mode.
no lldp run
Use the_____command in global configuration mode to configure
ntp server <ip-address>
A ________ is a license that never expires. After a________ is installed on a router, it is good for that particular feature set for the life of the router
permanent license
When a new router is shipped, it comes _____ with the software image and the corresponding permanent licenses for the customer-specified packages and features.
preinstalled
The software clock on a router or switch starts when the system boots and is the _____ source of time for the system.
primary
The ______command verifies that we are viewing the NVRAM directory.
pwd (present working directory)
On the File menu, click Log.
step 1. of Backup Configurations with Text Capture (Tera Term)
On the File menu, click Send file.
step 1. of Restoring Text Configurations
Choose the location to save the file. Tera Term will begin capturing text.
step 2. of Backup Configurations with Text Capture (Tera Term)
Locate the file to be copied into the device and click Open.
step 2. of Restoring Text Configurations
After capture has been started, execute the show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be directed to the chosen file.
step 3. of Backup Configurations with Text Capture (Tera Term)
Tera Term will paste the file into the device.
step 3. of Restoring Text Configurations
When the capture is complete, select Close in the Tera Term: Log window.
step 4.of Backup Configurations with Text Capture (Tera Term)
An NTP network gets the time from authoritative time sources. These authoritative time sources, also referred to as______ devices, are high-precision timekeeping devices assumed to be accurate and with little or no delay associated with them.
stratum 0
The _____ devices are directly connected to the authoritative time sources. They act as the primary network time standard.
stratum 1
The _____ servers are connected to stratum 1 devices through network connections. _______ devices, such as NTP clients, synchronize their time using the NTP packets from stratum 1 servers. They could also act as servers for stratum 3 devices.
stratum 2
When NTP is implemented in the network, it can be set up to ________ to a private master clock or it can synchronize to a publicly available NTP server on the Internet.
synchronize
The ____ protocol allows networking devices to send their system messages across the network to syslog servers.
syslog
The router comes with the evaluation license, known as a ______, for most packages and features supported on the specified router. This allows customers to try a new software package or feature by activating a specific evaluation license.
temporary license
By default, log messages are not ______.
timestamped.
It is important to synchronize the time across all devices on the network because all aspects of managing, securing, troubleshooting, and planning networks require accurate _____.
timestamping
Unified Communications package (not available on 1900 series)
uck9
NTP uses UDP port ___ and is documented in RFC 1305.
123
Smaller stratum numbers indicate that the server is closer to the authorized time source than larger stratum numbers. The larger the stratum number, the lower the stratum level. The max hop count is ___.
15
Evaluation licenses are replaced with Evaluation Right-To-Use licenses (RTU) after __days. An Evaluation license is good for a ___day evaluation period. After the ____ days, this license automatically transitions into an RTU license.
60
The terminal settings to access the device are:
9600 baud rate No parity 8 data bits 1 stop bit No flow control
Whether the device is a router or a switch
Capabilities list
_______is a Cisco proprietary Layer 2 protocol that is used to gather information about Cisco devices which share the same data link
Cisco Discovery Protocol (CDP)
The ________allows the administrator to navigate to different directories and list the files in a directory, and to create subdirectories in flash memory or on a disk.
Cisco IOS File System (IFS)
A license file, also known as a Software Activation License, is obtained using one of the following options:
Cisco License Manager (CLM) Cisco License Registration Portal
The host name of the neighbor device
Device identifiers
Name of the feature
Feature
A normal information message that does not affect device functionality. For example, when a Cisco device is booting, you might see the following informational message: %LICENSE-6-EULA_ACCEPT_ALL: The Right to Use End User License Agreement is accepted.
Informational Level 6
Number of licenses available and in use, if counted. If non-counted is indicated, the license is unrestricted.
License Count
Priority of the license; such as high or low
License Priority
Status of the license; such as Active or In Use
License State
Type of license; such as Permanent or Evaluation
License Type
popular destinations for syslog messages include:
Logging buffer (RAM inside a router or switch) Console line Terminal line Syslog server
the date and time settings on a router or switch can be set using one of two methods:
Manually configure the date and time, Configure the Network Time Protocol (NTP)
This protocol allows routers on the network to synchronize their time settings with an NTP server. A group of NTP clients that obtain time and date information from a single source have more consistent time settings.
Network Time Protocol (NTP)
The notifications level is for normal, but significant events. For example, interface up or down transitions, and system restart messages are displayed at the notifications level.
Notification Level 5
the _____ serves as a receipt and is used to obtain a license. A _____ is an 11 digit alpha numeric key created by Cisco manufacturing. It defines the Feature Set associated with the _____. A _____ is not tied to a specific device until the license is created.
PAK
The hardware platform of the device
Platform
The name of the local and remote port
Port identifie
To clear an active permanent license from the Cisco 1900 series, 2900 series, and 3900 series routers, perform the following steps:
Step 1. Disable the technology package. Step 2. Clear the license.
Follow these steps to upgrade the software on the Cisco router:
Step 1. Download the file from cisco.com and transfer it to the TFTP server. Step 2. Ping the TFTP server from the router. Step 3. Compare the free flash space with the new image file size. Step 4. Copy the IOS image file from the TFTP server to the router using the copy command.
Use these steps to restore the running configuration from a TFTP server:
Step 1. Enter the copy tftp running-config command. Step 2. Enter the IP address of the host where the configuration file is stored. Step 3. Enter the name to assign to the configuration file. Step 4. Press Enter to confirm each choice.
To create a backup of the Cisco IOS image to a TFTP server, perform the following three steps:
Step 1. Ping the TFTP server to test connectivity Step 2. Use the show flash0: command on the router to determine the size of the Cisco IOS image file. Step 3. Copy the image to the TFTP server using the copy source-url destination-url command
After the license has been purchased, the customer receives a license file. Installing a permanent license requires two steps:
Step 1. Use the license install stored-location-url privileged exec mode command to install a license file. Step 2. Reload the router using the privileged exec command reload.
In global configuration mode, use the logging command toconfigure the destination hostname or IPv4 address of the syslog.
Step 1. for configuring syslog
Control the messages that will be sent to the syslog server with the logging trap level global configuration mode command. For example, to limit the messages to levels 4 and lower (0 to 4), use one of the two equivalent commands.
Step 2. for configuring syslog
Optionally, configure the source interface with the logging source-interface interface-type interface-number global configuration mode command. This specifies that syslog packets contain the IPv4 or IPv6 address of a specific interface, regardless of which interface the packet uses to exit the router.
Step 3. for configuring syslog
View the file to verify that it was not corrupted.
Step 5. of Backup Configurations with Text Capture (Tera Term)
____, the lowest stratum level, indicates that a device is unsynchronized. Time servers on the same stratum level can be configured to act as a peer with other time servers on the same stratum level for backup or verification of time.
Stratum 16
As a network grows, Cisco IOS Software images and configuration files can be stored on a central _______. This helps to control the number of IOS images and the revisions to those IOS images, as well as the configuration files that must be maintained.
TFTP server
The ____ is a combination of the Product ID (PID), the Serial Number (SN), and the hardware version. The SN is an 11 digit number which uniquely identifies a device. The PID identifies the type of device. Only the PID and SN are used for license creation.
UDI
The ____ flash feature provides an optional secondary storage capability and an additional boot device. Images, configurations, and other files can be copied to or from the Cisco USB flash memory with the same reliability as storing and retrieving files using the Compact Flash card
USB
This universal image offers all of the Cisco IOS Software features, including strong payload cryptography features, such as IPsec VPN, SSL VPN, and Secure Unified Communications.
Universal images with the "universalk9" designation in the image name
The strong enforcement of encryption capabilities provided by Cisco Software Activation satisfies requirements for the export of encryption capabilities. However, some countries have import requirements that require that the platform does not support any strong cryptography functionality, such as payload cryptography.
Universal images with the "universalk9_npe" designation in the image name
These messages are error messages about software or hardware malfunctions; these types of messages mean that the functionality of the device is affected. The severity of the issue determines the actual syslog level applied.
Warning Level 4 - Emergency Level 0
Because most network devices are connected to other devices, CDP can _______in network design decisions, troubleshooting, and making changes to equipment. can also be used as a network discovery tool to determine the information about the neighboring devices
assist
The stratum level is defined as the number of hop counts from the _____ source.
authoritative
use the ______command to copy the configuration file to the USB flash drive.
copy run usbflash0:/
configure the router to load the new image during bootup using the command.
boot system
flash file system also has an asterisk preceding it. This indicates that flash is the current default file system. The _______ IOS is located in flash; therefore, the pound symbol (#) is appended to the flash listing, indicating that it is a bootable disk.
bootable
To view the contents of NVRAM, you must change the current default file system using the _____ command
cd (change directory)
To enable CDP on the specific interface again, enter ______
cdp enable
To enable CDP globally for all the supported interfaces on the device, enter______ in the global configuration mode.
cdp run
The Cisco IOS Software Activation feature is a ________ of processes and components used to activate Cisco IOS software feature sets by obtaining and validating Cisco software licenses.
collection
To save the running configuration or the startup configuration to a TFTP server, use either the ____________or________ command
copy running-config tftp or copy startup-config tftp
The most _____ messages are link up and down messages, and messages that a device produces when it exits from configuration mode.
common
After the new passwords are configured, change the configuration register back to 0x2102 using the _______command in the global configuration mode. Save the running-config to startup-config and reload the device
config-register 0x2102
The ______ command allows the user to set the configuration register to 0x2142. With the configuration register at 0x2142, the device will ignore the startup config file during startup.
confreg 0x2142
Data technology package
datak9
On Cisco network devices, the syslog protocol starts by sending system messages and ___ output to a local logging process internal to the device.
debug
the _______ command lists the contents of NVRAM. Although there are several configuration files listed, of specific interest is the startup-configuration file.
dir
Alternatively, syslog messages may be sent to an _____. Messages sent to the _______ are only viewable through the CLI of the device.
internal buffer
IP Base technology package
ipbasek9
system unusable
level 0(emergency)
immediate action needed
level 1(alert)
critical condition
level 2(critical)
error condition
level 3(error)
warning condition
level 4(warning)
normal, but significant condition
level 5(notification)
informational message
level 6(informational)
debugging message
level 7(debugging)
The __________ global configuration mode command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features
license accept end user agreement
The ____ command is used to copy all licenses in a device and store them in a format required by the specified storage location. Saved licenses are restored by using the _____command.
license save , license install
To enable LLDP globally on a Cisco network device, enter the ____command in the global configuration mode.
lldp run
By default, Cisco routers and switches send log messages for all severity levels to the console. On some IOS versions, the device also buffers log messages by default. To enable these two settings, use the _________and________ configuration commands, respectively.
logging console and logging buffered global
If ACL logging is configured, the device generates syslog messages when packets ____ a parameter condition.
match
Security technology package
securityk9
LLDP must be configured _____to transmit and receive LLDP packets
separately
By default, the format of syslog messages on the Cisco IOS Software is as follows:
seq no: timestamp: %facility-severity-MNEMONIC: description
Use the command ______ to force logged events to display the date and time
service timestamps log datetime
To verify the status of CDP and display information about CDP, enter the ______ command
show cdp
Use the _____ interface command to display the interfaces that are CDP enabled on a device
show cdp
To verify the status of CDP and display a list of neighbors, use the ________ command in the privileged EXEC mode
show cdp neighbors
the ____ command displays the current time on the software clock. With the detail option, the time source is also displayed.
show clock
The command to view the file systems on a Catalyst switch is the same as on a Cisco router: ______
show file systems
the _______ command, which lists all of the available file systems on a Cisco 1941 router. This command provides useful information such as the amount of available and free memory, the type of file system, and its permissions.
show file systems
This UDI can be displayed using the _______i command
show license ud
To verify LLDP has been enabled on the device, enter the ____command in the privileged EXEC mode.
show lldp
With LLDP enabled, device neighbors can be discovered using the ____ command.
show lldp neighbors
When more details about the neighbors are needed, the ______ command can provide information, such as the neighbors' IOS version, IP address, and device capability.
show lldp neighbors detail
The ________ command displays the default logging service settings on a Cisco router
show logging
You can use the ______ command to view any messages that are logged. When the logging buffer is large, it is helpful to use the pipe option (|) with the _____ command.
show logging
_____________and________ commands verify synchronization with NTP server.
show ntp associations and show ntp status